What’s in it for me?

Taking a look at the description of this course, you may be asking yourself – What’s in this course that I would be interested in?

This is Susanne Haas, I am a network architect and engineer as well as an instructor. I am also the person who has developed this course.

And here is a sampling of what we’ll be covering:

This video course is a combination of practical topics to introduce you not only to the Gigamon® platform but also to the concepts of ‘Packet Access’ technology.

This course is for anyone implementing a packet access solution in their network.  It is especially for those of you who have decided to implement a Gigamon Visibility Platform packet access solution.

You do not need to have any in-depth knowledge of packet access solutions, just a good basic background in networking and possibly security since these are the environments into which the packet access solutions fit.

Through this course, you will learn the key requirements for sharing packets between your network and security tools. You will also learn about key features and the configuration of Gigamon® devices as well as the value of properly incorporating a packet access Visibility Fabric™ into your network monitoring system. The material covered has been recently updated to include the latest capabilities and features released from Gigamon.

With increasing demands for agility and automation in the IT infrastructure and with ever-changing threat patterns in the network traffic, there is a critical need to automatically detect, react, and respond to these threats while also integrating visibility into IT operations management.

This course will teach you how to use Gigamon's packet access technology to gain visibility into your network traffic to prevent these threats.

You will learn how to leverage the advanced processing capabilities of the GigaSMART® engine to process incoming traffic streams in a variety of ways to augment security analysis. You will also learn how to configure popular GigaSMART features such as De-Duplication, Adaptive Packet Filtering and NetFlow with Metadata.

We will walk through extensive configuration demonstrations that will show you how to use most of the capabilities and features available from any H Series node, as well as nodes configured with advanced features such as GigaSMART capability.

Because some of you may be more comfortable working with a Command Line Interface and others more comfortable with a GUI, we will be demonstrating the configuration of these features from both the CLI and GUI interfaces. These modules also walk you through the considerations for implementing a packet access solution in both physical and virtualized environments.

In addition, I have tried to make this course very visually interactive to help you remember the concepts covered.

So, with all of that said, I hope you will enjoy this course as well as others we have put together here at Digital Revolver.  Thank you!

Course Curriculum

  • 1

    Overview

    • Gigamon Solution Overview Part 1

      FREE PREVIEW
    • Gigamon Solution Overview Part 2

    • Gigamon High Density Solution Part 1

    • Gigamon High Density Solution Part 2

    • Gigamon High Density Solution Part 3

    • Gigamon Active Visibility beyond tap and aggregation

  • 2

    2

    • Gigamon Selecting a Traffic Source

    • Gigamon Initial Setup of H-Series Nodes

  • 3

    GigaVUE-FM

    • Gigamon GigaVUE-FM part 1

    • Gigamon GigaVUE-FM part 2

  • 4

    4

    • Gigamon Port Types Part 1

    • Gigamon Port Types part 2

    • Gigamon Basic Flow Mapping part 1

    • Gigamon Basic Flow Mapping part 2

    • Gigamon Additional Filter Types

  • 5

    GigaSMART

    • Gigamon GigaSMART Overview

    • Gigamon GigaSMART Deduplication Part 1

    • DR Gigamon GigaSMART Deduplication Part 2

    • Gigamon GigaSMART Packet Slicing Part 1

    • Gigamon GigaSMART Packet Slicing Part 2

    • Gigamon GigaSMART Packet Masking Part 1

    • Gigamon GigaSMART Packet Masking Part 2

    • Gigamon GigaSMART Tunneling Part 1

    • Gigamon GigaSMART Tunneling Part 2

    • Gigamon GigaSMART Adaptive Packet Filtering Charateristics and Use Cases

    • Gigamon GigaSMART Adaptive Packet Filtering Configuration part 1

    • Gigamon GigaSMART Adaptive Packet Filtering Configuration part 2

    • Gigamon GigaSMART NetFlow Generation and Use Cases part 1

    • Gigamon GigaSMART NetFlow Generation and Use Cases part 2

    • Gigamon GigaSMART NetFlow Configuration part 1

    • Gigamon GigaSMART NetFlow Configuration part 2

    • Gigamon GigaSMART NetFlow Configuration part 3

    • Gigamon GigaSMART SSL Decryption Overview and Use Cases

    • Gigamon GigaSMART SSL Decryption Configuration part 1

    • Gigamon GigaSMART SSL Decryption Configuration part 2

  • 6

    6

    • Gigamon Private Cloud Solutions GigaVUE-VM part 1

    • Gigamon Private Cloud Solutions GigaVUE-VM part 2

    • DR Gigamon for OpenStack

    • Gigamon Public Cloud Solutions Gigamon for AWS

About the instructor

Senior Instructor

Susanne Haas

Susanne is an expert in the field of Networking and Telecommunications whose career spans over 30 years of network implementation and design as well as teaching experience.  In the course of her career, she has attained technical expertise in areas such as; enterprise IP networking, wireless networking, cloud networking, network visibility and packet access, network security, Carrier Ethernet, MPLS, cellular network technologies, video technologies, VoIP technologies, transport and signaling, and optical technologies such as SONET/SDH.She holds multiple certifications in these technology areas including CCNP and CCIE written level certification for Routing and Switching technologies, Wireless and Security from Cisco as well as other vendors.Susanne is one of the top rated instructors in the US and in addition to her CCSI#34995 she holds instructor level certifications for vendors such as Juniper, HP and Ciena.Most recently she has been involved in design and implementation of network visibility and packet access for both physical and cloud networking environments as well as network security. In addition to teaching, she writes certification courses for groups like Cisco, HP, Juniper, Gigamon, etc.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...